Lab 13: Red Team Operations

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Design red team rules of engagement and operational scope

  • Apply threat modelling (STRIDE/PASTA/attack trees)

  • Map attack paths using MITRE ATT&CK and Dijkstra's algorithm

  • Understand C2 architecture and purple team methodology


Step 1: Red Team vs Penetration Testing

Aspect
Penetration Test
Red Team

Goal

Find vulnerabilities

Test detection & response capability

Duration

Days-weeks

Weeks-months

Scope

Defined scope (systems/apps)

Goal-based (e.g., "exfil crown jewels")

Stealth

Not required

Required (emulate real adversary)

Notification

IT team often notified

Only exec/legal/HR ("white team")

Deliverable

Vulnerability list

Detection gap report + attack narrative

Audience

Technical (IT/Security)

Executive + SOC


Step 2: Rules of Engagement

ROE document must include:


Step 3: Threat Modelling — STRIDE

STRIDE threat categories:

Threat
Description
Control

Spoofing

Claiming false identity

Authentication (MFA)

Tampering

Modifying data/code

Integrity checks, digital signatures

Repudiation

Denying actions

Audit logging, non-repudiation

Information Disclosure

Unauthorised data access

Encryption, access control

Denial of Service

Disrupting availability

Rate limiting, redundancy

Elevation of Privilege

Gaining higher rights

Least privilege, RBAC

STRIDE applied to a web application login:


Step 4: PASTA Threat Modelling

PASTA (Process for Attack Simulation and Threat Analysis) — 7 stages:


Step 5: Attack Path Graph — Dijkstra

📸 Verified Output:


Step 6: C2 Framework Architecture (Concepts)

C2 (Command & Control) components:

Operational security (OPSEC) for red teams:

  • Use domain fronting or CDN fronting for C2 traffic

  • Rotate infrastructure; never reuse burned infrastructure

  • HTTPS with valid certificate (Let's Encrypt on redirector)

  • C2 profile mimics legitimate software (e.g., Microsoft Teams traffic)

  • Kill switch: implant removes itself if specific conditions met

Blue team detection of C2:

  • Beaconing analysis (regular periodic connections)

  • JA3/JA3S TLS fingerprinting

  • Domain age and reputation

  • Certificate Subject/Issuer anomalies

  • Unusual process making outbound connections

⚠️ Legal note: C2 infrastructure and offensive tooling are for authorised red team engagements only. All activities require written authorisation.


Step 7: Purple Team Methodology

Purple team vs Red team:

  • Red team: covert, adversarial, tests detection without telling defenders

  • Purple team: collaborative, adversary simulation with blue team present

  • Purpose: accelerate detection rule development; immediate feedback loop

Purple team exercise format:


Step 8: Capstone — Red Team Report Structure

Professional red team report structure:


Summary

Concept
Key Points

Red team vs pentest

Red team = detection test; pentest = vulnerability finding

ROE

Written, signed authorisation; explicit prohibitions

STRIDE

6 threat categories: Spoofing, Tampering, Repudiation, Info Disclosure, DoS, EoP

PASTA

7-stage risk-centric threat modelling

Attack graph

Dijkstra finds shortest (lowest-cost) attack path

C2

Implant ↔ Redirector ↔ Team Server; OPSEC critical

Purple team

Collaborative; accelerates detection development

Last updated